3 Scary Possibilities for Cybercrime

Rating :

Comments

logybombat July 19,2015I think mobile attacks are now more common now than any other type. There are a wide variety of devices out there which can be concealed from even the most strict security. You hear a lot about celebrities getting hacked and having lots of pictures and information leak. Some of it sounds like BS, but a certain percentage is real and I think this video nicely depicts just how easy it really is.

arautat July 20,2015Cell phone hackers can possibly cause more damage than traditional pc hackers. Most people have auto login features for most apps in their cell phone that contains financial data, social media, map history. Imaging hacking into a cell phone that connects to other devices such as cars via bluetooth and being able to control them remotely.

TimWalshat July 21,2015I think a big factor in mobile hacks is the human factor. People often don't even think about the security of their mobile devices, what apps they download etc. As the video stated, many of the viruses are downloaded by the user.
This I think will end up being the focus of forensics in the future. More and more personal information is stored on mobile devices. The fact that some newer devices allow use as a payment method (people paying with their phones in a coffee shop) seems like it would present and attractive market for hackers.

randerson0at July 22,2015I will definitely be doing more research into the reputation of the publisher of the apps that I download from now on. I can't believe everything that the hacker was able to do. His social engineering schemes feels like one I could definitely fall for.

428Mach1at July 22,2015Rick Ferguson : "Not a prediction it`s a warning" - cannot emphasize this too strongly !!! Too many folks blindly download apps with no thought to the vulnerabilities. I am astounded at their naivety !! Mr. Ferguson`s points :
1)Lock your device with a password !!!
2) Use official app distribution channels
3) Check the permissions of downloaded apps
4) Check the publishers and reputations of every downloaded app
5) Invest in effective management and security software.
The scenarios were well portrayed - I will now have nightmares.